DAUPHEN

Maison · Est. MMXXV

The art of
offensive craft.

A private atelier of red team engineering. Bespoke implants, command and control, and the quiet primitives behind a modern operator's toolkit.

Languages
Zig · Rust · C
Domain
Malware Dev
Operator
Solo
Indirect SyscallsSleep ObfuscationReflective LoadersEDR EvasionBOF ExecutionC2 Architecture
Indirect SyscallsSleep ObfuscationReflective LoadersEDR EvasionBOF ExecutionC2 Architecture
Indirect SyscallsSleep ObfuscationReflective LoadersEDR EvasionBOF ExecutionC2 Architecture
Indirect SyscallsSleep ObfuscationReflective LoadersEDR EvasionBOF ExecutionC2 Architecture
Phishing InfrastructureKill ChainPayload MutationOPSECExploit ResearchRed Team
Phishing InfrastructureKill ChainPayload MutationOPSECExploit ResearchRed Team
Phishing InfrastructureKill ChainPayload MutationOPSECExploit ResearchRed Team
Phishing InfrastructureKill ChainPayload MutationOPSECExploit ResearchRed Team

The full kill chain.
Every phase. Every layer.
Nothing missing.

01
initial-access

Phishing Infrastructure

End-to-end phishing capability. Domain aging, pixel-perfect lure pages, credential capture, and evasion-aware delivery built for modern awareness-trained targets.

Lures · Infra · Evasion · Delivery

02
comms

C2 Framework

Purpose-built command and control. Jittered beacons, encrypted channels, malleable profiles. Operator anonymity from first callback to last.

ChaCha20 · DNS · SMB · HTTP

03
on-demand

Exploit Database

A living, operational index of exploits. Curated, tested, and ready to deploy. No stale PoCs. Every entry is verified against real targets.

CVEs · PoC · Verified · Updated

04
augmented

AI-Assisted Operations

Optional intelligence layer. Automated recon synthesis, payload mutation, and target profiling. Accelerating the operator, not replacing them.

Recon · Mutation · Profiling